applying it disaster recovery/business continuity preparation · 1/10/2017  · a business...

7
Page 1 of 7 The attack has hit us! Now what? Applying IT Disaster Recovery/Business Continuity Preparation During the development of Security Policies for an organization that was at the beginning of a journey towards safeguarding their own (and their customer's) data, we were never asked the most obvious question: What if a disaster strikes and we have to go through this? Everyone was so concentrated on determining the input, that the obvious thought did not appear: What do we really do when disaster strikes in particular? All good and well having a great policy, but we need to get cracking at implementing technical solutions that help us act when the unthinkable really occurs. Based on the policy, strategies to act in accordance to the policies emerge. And sometimes, like in this case, new solutions to issues at hand are discovered. source: Carnegie Mellon 1

Upload: others

Post on 30-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page1of7

Theattackhashitus!Nowwhat?ApplyingITDisasterRecovery/BusinessContinuityPreparation

DuringthedevelopmentofSecurityPoliciesforanorganizationthatwasatthebeginningofajourneytowardssafeguardingtheirown(andtheircustomer's)data,wewereneveraskedthemostobviousquestion:Whatifadisasterstrikesandwehavetogothroughthis?Everyonewassoconcentratedondeterminingtheinput,thattheobviousthoughtdidnotappear:Whatdowereallydowhendisasterstrikesinparticular?Allgoodandwellhavingagreatpolicy,butweneedtogetcrackingatimplementingtechnicalsolutionsthathelpusactwhentheunthinkablereallyoccurs.Basedonthepolicy,strategiestoactinaccordancetothepoliciesemerge.Andsometimes,likeinthiscase,newsolutionstoissuesathandarediscovered.

source:CarnegieMellon1

Page2of7

ABusinessContinuityPlanorBCPishowanorganizationguardsagainstfuturedisastersthatcouldendangeritslong-termhealthortheaccomplishmentofitsprimarymission.TheprimaryobjectiveofaDisasterRecoveryplan(a.k.a.BusinessContinuityplan)isthedescriptionofhowanorganizationhastodealwithpotentialnaturalorhuman-induceddisasters.Thedisasterrecoveryplanstepsthateveryenterpriseincorporatesaspartofbusinessmanagementincludestheguidelinesandprocedurestobeundertakentoeffectivelyrespondtoandrecoverfromdisasterrecoveryscenarios,whichadverselyimpactsinformationsystemsandbusinessoperations.Planstepsthatarewell-constructedandimplementedwillenableorganizationstominimizetheeffectsofthedisasterandresumemission-criticalfunctionsquickly.2AccordingtoNIST,TheDRPonlyaddressesinformationsystemdisruptionsthatrequirerelocation3.(Source:NIST).Forourshortanalysis,wewilltreatthetwotermsasmeaningthesame–itisnotquitenecessary(orpossible)toinvestinanalternativelocationlikeacontainerdata-centerinallcases.BusinessesshoulddevelopanITdisasterrecoveryplan.Itbeginsbycompilinganinventoryofhardware(e.g.servers,desktops,laptopsandwirelessdevices),softwareapplicationsanddata.Unfortunately,inventoriesposeanissuemoreoftenthannot.Havingacompleteandup-to-dateassetlistisnotsupportedinthewayneededanddesiredforadisasterrecoveryplan.Mosttoolsonthemarketsupportonlyalimitednumberofoperatingsystems,andnon-smartassetsareatediousmanualworkload.ThetoolsetR&Poffersunderpinningourfield-provenmanaged/militaryprojectoffice,isoperatingsystemagnosticandprovidesreal-timeinformationbackonHW-assets,SW-assets(alloperatingsystems),firmware-assets,BIOS/EFI,router/switch-configs,printer-queue/print-serverconfigurationandbywayofthenewestaddition,alsoprovidesaccesstofirmwareversionsofdisplaysandfurthernon-smartassets.Fromthisinventory,itisfairlyeasytoidentifycriticalsoftwareapplicationsanddataandthehardwarerequiredtorunthem.Usingstandardizedhardwarewillhelptoreplicateandreimagenewhardware.Ensurethatcopiesofprogramsoftwareareavailabletoenablere-installationonreplacementequipment.Prioritizehardwareandsoftwarerestoration4.(Source:HLSUS)

PhasesofbuildingaBC-orDRPlanPhaseI–DataCollection

-theprojectshouldbeorganizedwithtimeline,resources,andexpectedoutput-thebusinessimpactanalysisshouldbeconductedatregularintervals-ariskassessmentshouldbeconductedregularly-OnsiteandOffsiteBackupandRecoveryproceduresshouldbereviewedregardingsuitabilityandperformance

-Alternatesitelocations(ifany)mustbeselectedandreadyforuse

Page3of7

PhaseII–PlanDevelopmentandTesting-developmenttheDisasterRecoveryPlan(DRP)-Testtheplan(regularly)PhaseIII–MonitoringandMaintenance-Maintenanceoftheplanbywayofupdatesandregularreviews-PeriodicinspectionorauditofDRP-DocumentationofanychangesThereis–ofcourse–needtointroducetostaffanynecessaryinformationabouttheplansandtrainthemonit,otherwise,staffcannotobligetotherulesonceacriticalsituationhits.

DisasterRecoveryPlanCriteriaAdocumentationoftheproceduresastodeclaringemergency,evacuationofsitepertainingtonatureofdisaster,activebackup,notificationoftherelatedofficials/DRteam/staff,notificationofprocedurestobefollowedwhendisasterbreaksout,alternatelocationspecifications,shouldallbemaintained.ItisbeneficialtobepreparedinadvancewithsampleDRPsanddisasterrecoveryexamplessothateveryindividualinanorganizationarebettereducatedonthebasics.AworkablebusinesscontinuityplanningtemplateorscenarioplansareavailablewithmostIT-basedorganizationstotrainemployeeswiththeprocedurestobecarriedoutintheeventofacatastropheoccurring5.RecoverystrategiesshouldbedevelopedforInformationtechnology(IT)systems,applicationsanddata.Thisincludesnetworks,servers,desktops,laptops,wirelessdevices,dataandconnectivity.PrioritiesforITrecoveryshouldbeconsistentwiththeprioritiesforrecoveryofbusinessfunctionsandprocesses6.(Source:HLSUS)Downtimecanbeidentifiedinseveralways7(SourceNIST):

Page4of7

Cost-BenefitThelongeradisruptionisallowedtocontinue,themorecostlyitcanbecometotheorganizationanditsoperations.Conversely,theshorterthereturntimetooperations,themoreexpensivetherecoverysolutionscosttoimplement8.(NotethatR&Pexcelincost-reductionofsystemsrecovery)

ITRecoveryStrategies

Page5of7

Informationtechnologysystemsrequirehardware,software,dataandconnectivity.Withoutonecomponentofthe“system,”thesystemmaynotrun.Therefore,recoverystrategiesshouldbedevelopedtoanticipatethelossofoneormoreofthefollowingsystemcomponents:-Computerroomenvironment(securecomputerroomwithclimatecontrol,conditionedandbackuppowersupply,etc.)-Hardware(networks,servers,desktopandlaptopcomputers,wirelessdevicesandperipherals)-Connectivitytoaserviceprovider(fiber,cable,wireless,etc.)-Softwareapplications(electronicdatainterchange,electronicmail,enterpriseresourcemanagement,officeproductivity,etc.)-Dataandrestoration9(Source:HLSUS)

ImpactAnalysisTheimpactanalysisshouldidentifytheoperationalandfinancialimpactsresultingfromthedisruptionofbusinessfunctionsandprocesses.Impactstoconsiderinclude:

• Lostsalesandincome• Delayedsalesorincome• Increasedexpenses(e.g.,overtimelabor,outsourcing,expeditingcosts,etc.)• Regulatoryfines• Contractualpenaltiesorlossofcontractualbonuses• Customerdissatisfactionordefection• Delayofnewbusinessplans

incaseofcorporatebusinessesandinsimilarwaysforpublicservices.10

TestingandMaintenanceThedatesoftesting,thedisasterrecoveryscenarios,andplansforeachscenarioshouldbedocumented.Maintenanceinvolvesrecordsofscheduledreviewonadaily,weekly,monthly,quarterly,yearlybasis;reviewsofplans,teams,activities,tasksaccomplishedandcompletedocumentationreviewandupdate.

IncaseofanincidentThesearetherecommendedthreestepsincaseanyincidenthappens,beitahackingattackorothermalevolentcyber-incidents(e.g.ransomwarehittingtheorganization),malfunctioningsoftware-oroperating-system-updatesorfaultyfirmware,BIOSorsoftwarepatches:–Identification–Containment

Page6of7

–Eradication(AgoodexampleofactionsperformedduringtheeradicationphasewouldbeusingtheR&P-providedtoolsetwhichallowsforanindividualrecoveryofeachcompletesystemend-to-end).Professionalservicesclosetheattack-vectors,butatthispoint,itisoftheessencenottolosetimewithforensicoranalyticalwork.Ifnecessary,theR&Ptoolsmayperformcloningofaffectedsystemsforanalyticuselater.

–Recovery(bringaffectedsystemsbackintotheproductionenvironmentcarefully,astoinsurethatitwillnotleadanotherincident.Itisessentialtotest,monitor,andvalidatethesystemsthatarebeingputbackintoproductiontoverifythattheyarenotbeingre-infectedbymalwareorcompromisedbysomeothermeans.)

–LessonsLearnt11(well,thisisthetaskofdocumentationeveryonehates,butitisessentialforfuturereference)

ChecklistThischecklisthelpstomakesureallboxesaretickedincasetheincidenthitsyou:-Stoptheattackinprogress.-Cutofftheattackvector.-Assembletheresponseteam.-Isolateaffectedinstances.-Identifytimelineofattack.-Identifycompromiseddata.-Assessrisktoothersystems.-Assessriskofre-attack.-Applyadditionalmitigations,additionstomonitoring,etc.-Forensicanalysisofcompromisedsystems.-Internalcommunication.-Involvelawenforcement(ifyouarenotlawenforcementyourselves).-Reachouttoexternalpartiesthatmayhavebeenusedasvectorforattack.-Externalcommunication.

GettingridofassumptionsasawinningstrategySummarizing,herearethefivemajorpointstoconsider:1.RepetitiveprobingandrepeatedtestsofITsecuritywilldeliverfactsandfiguresvs.afalsefeelingofsafety2.Generallyspeaking,theleadtimetorecoveryofanyofyourconfigurableitems(CI)isthebestpossiblerecoverytime.Anycompanycanbeoutofbusinessquick,ifincapableofreturningtoanoperationalstate.IfDeutscheBankisnotoperationaloneday,itistheirdoomsday.SecuritytestswilldeliverunpleasantfactsonIT–assetsformerlydeemedsafe.Take20minutestoreturntonormalasagoal.

Page7of7

3.Companieslosecustomersduetovanishedtrustintheircapabilities(e.g.repeatedoutagesorabilitytoadapt.Publicservicessometimeshaveevenmorecriticalusageand

dependonminutes.UsingexperiencesfromR&Ppublicsector/HLSexperiencesisnotabadidea.4.TheshortcutinimplementingdisasterrecoveryistoimplementaproperDRcapabilityalreadyintheearlyplanningphase.5.ThesecondbeststrategyisnottolosetimeoverreviewingexistingITinfrastructureandenhanceitbyapplyingtheR&PMPO-toolset.Roth&Partnershavesignificantexperienceintheabove5topicsandthecapabilitytosupportITexpertsgloballyintheirchallengetoenhanceITsecuritysystems.Youradvantage:Giveusabellatoneofourcentersorwriteamail:

Sources:

1http://resources.sei.cmu.edu/asset_files/TechnicalReport/2004_005_001_14405.pdf2http://www.disasterrecovery.org/3http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf4https://www.ready.gov/business/implementation/IT5http://www.disasterrecovery.org/plan_steps.html6https://www.ready.gov/business/implementation/IT7http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf8http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf9https://www.ready.gov/business/implementation/IT10https://www.ready.gov/business-impact-analysis11https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901